Boosted by Machine Learning to keep your infrastructure safe
Digital transformation is turning IT Operations into the most significant element of daily business activities. Corporate assets are also transforming due to the continuous abstraction and convergence of ICT resources. Cloud and mobility have multiplied operational challenges while creating at the same time new business opportunities.Digital business and its operations generate new, diverse, cyber security challenges in terms of everyday productive engagements but also in terms of compatibility with regulation, compliance and financial governance. As online transactions and data are growing exponentially, cyber threats are the norm, not the extraordinary. IT security is now an integral part of business operations and a critical element of corporate activity.
Infusion Agents are installed on monitored hosts and collect operational data. The Infusion Manager collects and analyzes data transforming them to exploitable information.The Infusion Manager can also initiate inbound port scanning and vulnerability assessment of monitored infrastructure. The Web User Interface visualizes the information and enables management and mitigation of risk for the monitored infrastructure
Inventory of Licensed Nodes
(having the Infusion Agent installed and running).
Infusion Inventory sets the base for the proper asset management of the underlying infrastructure.
Ip-based, agent-independent overview of the LAN’s devices services.
Infusion port scanning offers a thorough depiction of the activity inside the local network from an external approach, adding another level of situational awareness.
Agent-based Nodes monitoring.
Hosts (nodes with agents installed) & services running on them.
Infusion Host monitoring provides operational awareness of the basic infrastructure elements and their services along with early warning in case of downtime or other critical status level.
Detection of common cybersecurity vulnerabilities.
Agent-based assessment built around specific operational requirements and policies along with publicly known and reported vulnerability issues (i.e. CVE® lists).
Infusion Vulnerability Assessment provides the administrator with essential information on the Nodes (agent hosts) status enabling them to get insight, impact assessment and proposed solutions about soft points in their infrastructure.
Nodes profiling and performance management.
Infusion Analytics combines details about the status of the infrastructure with a data fusion overview approach through the Black Hat scoring scale (black hat = hacker) for each node hosting an agent. The lowest the score for a node (host) the better. Details concerning each node’s assets and operation are broken down and visualized accordingly through intuitive UI.
Surveillance and data gathering for events on all aspects of systems (hosts) activity including file integrity monitoring, log monitoring, rootcheck, and process monitoring.
Infusion event analyzer is built on open components (i.e. OSSEC toolkit) gathering relative operational data and triggers rule based alerts enabling active response where needed.
Real time or historical snapshots of the hosts with detailed analysis on processes and features.
Infusion forensic analysis instigates the ability to preserve, identify, recover, analyze and present facts concerning events and their impact in operational capability.
Inventory of Licensed Nodes
(having the Infusion Agent installed and running).
Infusion Inventory sets the base for the proper asset management of the underlying infrastructure.
Ip-based, agent-independent overview of the LAN’s devices services.
Infusion port scanning offers a thorough depiction of the activity inside the local network from an external approach, adding another level of situational awareness.
Agent-based Nodes monitoring.
Hosts (nodes with agents installed) & services running on them.
Infusion Host monitoring provides operational awareness of the basic infrastructure elements and their services along with early warning in case of downtime or other critical status level.
Detection of common cybersecurity vulnerabilities.
Agent-based assessment built around specific operational requirements and policies along with publicly known and reported vulnerability issues (i.e. CVE® lists).
Infusion Vulnerability Assessment provides the administrator with essential information on the Nodes (agent hosts) status enabling them to get insight, impact assessment and proposed solutions about soft points in their infrastructure.
Nodes profiling and performance management.
Infusion Analytics combines details about the status of the infrastructure with a data fusion overview approach through the Black Hat scoring scale (black hat = hacker) for each node hosting an agent. The lowest the score for a node (host) the better. Details concerning each node’s assets and operation are broken down and visualized accordingly through intuitive UI.
Surveillance and data gathering for events on all aspects of systems (hosts) activity including file integrity monitoring, log monitoring, rootcheck, and process monitoring.
Infusion event analyzer is built on open components (i.e. OSSEC toolkit) gathering relative operational data and triggers rule based alerts enabling active response where needed.
Real time or historical snapshots of the hosts with detailed analysis on processes and features.
Infusion forensic analysis instigates the ability to preserve, identify, recover, analyze and present facts concerning events and their impact in operational capability.